Nids Vs Hids

Read Complete Research Material



NIDs VS HIDs



NIDs VS HIDs

Introduction

According to (Crothers, 2002; Schultz, Endorf, & Mellander, 2003), intrusion detection task is based on identifying and responding to abnormal (suspicious) activities. These activities are integrated with communication and computing resources. The system of intrusion collects and integrates the data from target systems which needs to be protected. The IDS main objective is to identify the intrusion whenever detected. The IDS can be future classified in to two types; home-based system and host base system.

Discussion

Network intrusion detection system

This NID system is strongly associated with the security of computer. It is a system of intrusion detection, whose main responsibility is to identify unauthorized computer network access. The identification is done through analyzing the network traffic for the signs of malicious activity (Ryan, 2010, pp 209-221). The system is developed by placing a card of network-interface in promiscuous mode. Network base is integrated with real time monitoring of the system files.

Host-based intrusion system

The internal part of computing system is controlled by HID system. This system detects the intrusion of any malware on a computer system, in order to ensure the efficiency and effectiveness of the machine. It controls all the dynamic behaviors of a computing system. If, the computer faces any disability, it generates an automatic report to the end-user. The main objective of HID system is to ensure the performance of the computing system, at its optimal level. The system audits the data on a regular interval; if any intrusion intervenes an automatic report is generated. The audit of a data is a mechanism, which collects the data to monitor the activities of the user.

Similarities of HIDS AND NIDS

There are few similarities and dissimilarities between HIDs and NIDS. Both the system assists the user in protecting you on your Local area network (LAN). The administration ease of both the systems is equal with respect to perspective of central admin. The implementations of both the systems are easy, because these systems are strongly associated with central admin perspective. The facility of logging is incorporated in both the systems. The facility of alarm is present in both the system. Whenever, there abnormality in computer occurs, these systems reports to the administrator and the individual. This alarm helps the administrator to take further actions. Both the systems constitute the potential of up gradation. It is believed, that it is easier to upgrade software when compared with hardware. Centralized script is utilized to upgrade HIDs, whereas flash memory is used to upgrade NIDs who has a low overhead.

Dissimilarities' of HIDs AND NIDs

HIDs have the capability to protect a person, when he is off the LAN. On the other side, NIDs does not protect you, when you are off the LAN (Local area network). NIDs are quite expensive, whereas HIDs is considered as affordable system. NIDs system is expensive because it provides wide range of facilities to end-user. NIDs system requires extensive training, because it is complicated software. The ownership cost of HIDS is low, with respect to long ...
Related Ads
  • Firewalls & Nids
    www.researchomatic.com...

    For a given topology, NIDS, and firewall configurati ...